If you haven't already heard, Locky is back! Borrowing another tactic from the Dridex playbook, we're seeing the Locky campaign use malicious .pdf email attachments as its preferred infection vector.
Last update on Apr. 26, 2017.
Last update on Apr. 21, 2017.
Metro Community Provider Network (MCPN) – a public health nonprofit was fined and paid a $400,000 penalty for allowing a hacker to access employee email accounts and obtain electronic protected health information (ePHI) of 3,200 patients.
Last update on Feb. 6, 2017.
I’ve been in the Network Security industry for more than 20 years, which may be the only reason my entire life was not compromised.
Last update on Jan. 10, 2017.
By now, you may have heard of our CINS Army Initiative. (CINS stands for Collective Intelligence Network Security.)
Last update on Dec. 20, 2016.
FOR RELEASE Contact: Ginny McAdams +1.972.991.5005 x114 [email protected] Sentinel IPS Launches CINS Army New Initiative Using specific and actionable data to strengthen collective IT network security DALLAS – Dec. 13, 2016 – Sentinel IPS, a long-time sponsor of the Collective Intelligence Network Security (CINS) Army, announces a new…
Last update on Dec. 2, 2016.
THE BOUNCER GUY COMPARISON
Deep packet inspection versus firewall protection aka The Bouncer.
Last update on Nov. 7, 2016.
THE NECKTIE ANALOGY
When is a necktie requirement more like a network security noose? Read on to find out how the best ruleset intentions can go awry and how Sentinel IPS protects your network....
Last update on Oct. 7, 2016.
Did you know October is National Cyber Security Awareness Month? It’s an annual campaign to raise awareness of cybersecurity sponsored by the Department of Homeland Security...
Last update on Jan. 30, 2017.
You will probably find this question at the end of a blog, on an online “submit” form, on a customer ticket, or any other service-related web page you use daily. “How likely are you to recommend THIS WHATEVER to your friends and colleagues?” Then, you are given choices from “extremely unlikely” to “extremely likely.” However,…
Last update on Jan. 26, 2017.
One of the most confusing aspects of malware is that infiltrators never devised a better method of getting their software onto networks. Up to this point, ransomware and malware developers have relied on phishing emails and watering holes (targeted, compromised web sites hosting malicious code) as delivery methods; depending on trickery and the end user’s…